Wednesday, April 17, 2019

Word of the Day: client-server model

Word of the Day WhatIs.com
Daily updates on the latest technology terms | April 17, 2019
client-server model

Client-server is a relationship in which one program (the client) requests a service or resource from another program (the server). At the turn of the last century, the label client-server was used to distinguish distributed computing by personal computers (PCs) from the monolithic, centralized computing model used by mainframes.

Today, computer transactions in which the server fulfills a request made by a client are very common and the client-server model has become one of the central ideas of network computing. The client establishes a connection to the server over a local area network (LAN) or wide-area network (WAN), and once the server has fulfilled the client's request, the connection is terminated. Because multiple client programs share the services of the same server program, a special server called a daemon may be activated just to await client requests.

 

Until recently, the majority of network traffic was between clients and servers, a traffic pattern known as north-south. Increasingly, however, the volume of east-west (server to server) traffic has grown as a result of virtualization and data center trends such as cloud computing and converged infrastructure. The change is reflected in the way Chief Security Officers (CSOs) and network administrators are moving from a centralized security model designed to protect the confidentiality, integrity and availability (CIO triad) of network data within a perimeter to a distributed security model that focuses more on controlling individual user access to services and data, and auditing their behavior to ensure compliance with policies and regulations.


Client-server protocols

Clients typically communicate with servers by using the TCP/IP protocol suite. TCP is a connection-oriented protocol, which means a connection is established and maintained until the application programs at each end have finished exchanging messages. It determines how to break application data into packets that networks can deliver, sends packets to and accepts packets from the network layer, manages flow control and handles retransmission of dropped or garbled packets as well as acknowledgment of all packets that arrive. In the Open Systems Interconnection (OSI) communication model, TCP covers parts of Layer 4, the Transport Layer, and parts of Layer 5, the Session Layer.

In contrast, IP is a connectionless protocol, which means that there is no continuing connection between the endpoints that are communicating. Each packet that travels through the Internet is treated as an independent unit of data without any relation to any other unit of data. (The reason the packets do get put in the right order is because of TCP.) In the Open Systems Interconnection (OSI) communication model, IP is in layer 3, the Networking Layer.

Quote of the Day

 
"The traditional method of network security is the client-server model, which attempts to protect the confidentiality, integrity and availability of each layer of the networking stack. However, this centralized security model is struggling to meet the demands of large IoT deployments." - Gavin Whitechurch

Learning Center

 

Build your business case for thin client hardware
Thin client hardware offers companies security and ease of use in a VDI deployment, but IT must determine if their organization would benefit from using a thin client beyond the basic features. Read on to learn more about who gains the most from these tools, as well as the benefits and challenges.

12 essential features of advanced endpoint security tools
Organizations can use endpoint security tools to protect their endpoints -- such as laptops, desktop PCs and mobile devices, as well as servers in a data center -- from malicious attempts to gain access to their network.

Cloud transition echoes client-server technology shift
How does today's cloud computing transition compare with the former shift to client-server technology among systems integrators and consultancies?

How do I set up a file sharing server for three clients?
There are several ways to set up a file sharing server or make a file accessible to the server on a set of client workstations.

Discover thin client hardware and learn the benefits it offers
When it comes to running a business, security and project management are big concerns. Thin client hardware can help with this by focusing on different specifications, as well as by offering a wide range of options. Read more to learn how thin clients can help your organization.

Quiz Yourself

 
Our plan for client virtualization is somewhat different __________ our plan for server virtualization.
a. than
b. from

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

No comments: